摘要:
A method and apparatus for identity consolidation for a plurality of electronic identities is described. In one embodiment, the method includes receiving user identification data extracted from an electronic communication, the user identification data corresponding to an unknown identity of a sender of the electronic communication. The method further includes determining a known identity for the sender using the user identification data extracted from the electronic communication and associating the known identity with the unknown identity of the sender of the electronic communication. In one embodiment, an association between the known identity and the unknown identity is maintained to determine whether parties of subsequent information transfers are authorized to participate in the information transfers.
摘要:
The present invention encompasses compounds of the general formula (1) in which R1 to R3 are defined as in claim 1, which are suitable for treating diseases which are characterized by excessive or anomalous cell proliferation, and their use for producing a pharmaceutical having the abovementioned properties.
摘要:
A method and apparatus for defining the scope of a search is described. In one embodiment, user input is received, and the scope is defined, based on the user input, for a search of free-form text for information from any random rows within a tabular structure of source data. In one embodiment, the search is intended for finding, in the free-form text, a sub-set of data fragments that matches information from any single row within the tabular structure of the source data.
摘要:
A method and apparatus for managing data loss due to policy violations in temporary files is described. In one embodiment, the method includes monitoring, by a client agent, information content on a client for violations of a policy. The method further includes determining, by the client agent, that a violation of the policy has occurred for content of a temporary file of an application. In one embodiment, the policy violation of the temporary file is correlated, by the client agent, with an original file of the application.
摘要:
The present invention encompasses compounds of the general formula (1) in which R1 to R3 are defined as in Claim 1, which are suitable for treating diseases which are characterized by excessive or anomalous cell proliferation, and their use for producing a pharmaceutical having the abovementioned properties.
摘要:
Disclosed are compounds of general formula (I) wherein the groups R1 to R3 have the meanings given in the claims and in the specification. The compounds of the invention are suitable for the treatment of diseases characterized by excessive or abnormal cell proliferation pharmaceutical preparations containing such compounds and their uses as a medicament.
摘要:
The present invention encompasses compounds of general formula (1) wherein R1 to R3 are defined as in claim 1, which are suitable for the treatment of diseases characterized by excessive or abnormal cell proliferation, and the use thereof for preparing a medicament having the above-mentioned properties.
摘要:
A method and apparatus for defining the scope of a search is described. In one embodiment, user input is received, and the scope is defined, based on the user input, for a search of free-form text for information from any random rows within a tabular structure of source data. In one embodiment, the search is intended for finding, in the free-form text, a sub-set of data fragments that matches information from any single row within the tabular structure of the source data.
摘要:
A method and apparatus for defining the scope of a search is described. In one embodiment, user input is received, and the scope is defined, based on the user input, for a search of free-form text for information from any random rows within a tabular structure of source data. In one embodiment, the search is intended for finding, in the free-form text, a sub-set of data fragments that matches information from any single row within the tabular structure of the source data.
摘要:
A method and apparatus for classifying behavior of an application based on its data access pattern is described. In one embodiment, the method includes monitoring file access events associated with an application, and determining whether at least one of the file access events indicates the application's attempt to manipulate data of a file. If at least one file access event indicates the application's attempt to manipulate the data within the file, then at least one action is caused to be performed.